Thank you for your sharing. One thing you mention about is the stakeholders: the end users, the operations staff, and the support staff. The experience and even the benefits the will get must be considered by the developers.

Thank you for your sharing, I like what you talk about the short-term and long-term goals. There are lot of things we need to consider about before we decide which approach we should use, we should consider about the time, costs, and difficult level.

Thank you for your sharing. You give a very clear and detailed explanation of those three kinds of the approaches. The problem why the parallel approach cost highly than direct approach because it run both old and new system in the same time.

Intel, AMD, and Arm are three main processor manufacturers that almost all over the world computers use them. Thus, even a small vulnerability can affect the information security of thousands of peo […]

Thank you for your sharing. After reading about your introduction about the Zymr, I believe Zymr is a good choice for the organization to use. It’s excellent cloud mobility function make much convenience for the organization users.

Thank you for your sharing. You give many details about the cloud security guidelines. The step 10 Understand the security requirements of the exit process is important because this step is often be ignored by users.

Thank you for your sharing. I really like what you mentioned about the two-factor authentication, one-time passwords. These authentication methods are good to protect the data. However, how it can affect the cost and customer’s experiences.

The strong cloud services provider are Amazon Warehouse Services(AWS), Oracle, Microsoft, Google, and IBM.
I would like to use Microsoft Windows Azure or Amazon Warehouse Services(AWS).
They can choose Microsoft Windows Azure’s website hosting service and Spot Courier services, it is easy for organization to design their web applications. Also,…[Read more]

Thank you for your sharing, I have the same consider with about the price of the support hardware and software. If Fox wants to set up these support tools, it should consider about the price, the avg number from recently years disable students.

Thank you for your sharing, now I know the autism can be one type of the disability which I didn’t consider before. People with autism are usually very sensitive, especially for the language of others. Thus, technicians need to take this into account when designing tools and interactive interfaces.

Thank you for your sharing. I really interest in what you mentioned about the color blindness because some of my friends have different levels of color blindness. As far as I know, a good example comes from computer games, more and more games now have color-blind mode options. The same more and more software is also starting to use this model.

Thank you for your sharing. You gave the details about the components of the database and different types of the encryption method. I think the Application-level encryption is the most powerful encryption method to encrypt the database.

Thank you for your sharing. You gave some great ideas about the evaluation methods. I like you mentioned about the Ability to anticipate future requirements and Ongoing review, both two methods are caring about the future performance of the database to make sure it is strong enough and still meet with the requirements.

Thank you for your sharing. I really like what you talk about the “stakeholders,” you are right, so I think the stakeholders’ goals and benefits is one of the requirements that the team members need to pay attention to. Thus, whatever we missing team members who knows the requirements or the design experts, the result will not match with the…[Read more]

Designing a database is not a simple matter, it can not doing by only one person. The person knows about the requirements may not familiar with database designing. The design expert knows how to design a good database, but the result may not be matched with the requirements. Thus, as mentioned in the question, both who understand the application…[Read more]

Thank you for you sharing. The cross checking help the designer find the potential issues which can help the organization to reduce cost about also reduce the time cost, which increase the work efficiency. Same with LInlan and Yingyan, you are very smart!

Thank you for your sharing. I like what you mentioned about the different functions for the different types of the diagram and you use example to explain the cross checking. Because a simple or we can say the one diagram can not express the whole processes, thus, the cross checking is a method to make sure the steps are match with other diagram.

Thank you for your sharing, Mahugnon. One thing you mentioned about is the efficiency. You are right, the cross checking can help designers to find the issues in the early stage which reduce the time cost of the whole project.

Thank you for your sharing. You are right. I also comes out a question that is there a situation that both two different diagrams for the same processes will be correct? or there must have one contains frauds.